Rewriting the IT Security Manual for the Cloud Era

CLoud Era IT security

Anurag Kahol, CTO at Bitglass, investigates the ‘people perimeter’ within workplace IT security and why our existing technologies are not designed with the cloud era in mind.

Digital transformation has caused a revolution, and workforce mobility has replaced the traditional on-premises approach. As a result, the focus of technology spend is increasingly shifting to users, devices, and data. The traditional ‘hub and spoke’ model where everything including applications, data and users lived inside the corporate network is no longer viable given the sheer amount of cloud applications that are consumed. Businesses today are looking for dynamic access to both internal applications and external cloud applications.

This requires a major review of how organisations view their perimeters as a more agile, distributed set of access and control points. Ultimately, today’s modern security should be about advancing strategies in a fast, safe way, all while understanding the language of the cloud.

Security and network teams must change their approach to keep pace with the needs of modern organizations. The first few years of enterprise cloud adoption focused on a core set of commonly used SaaS applications. More recently, we’ve seen an accelerated use of a wider set of industry-specific and niche applications and, of course, internal apps moving to the cloud. With this transition comes a need for total security and compliance for any application or device.

Key components of network security architecture for the cloud era should, therefore, be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.

The people perimeter


The problem is that legacy security technology is not designed to secure data as it moves beyond the traditional idea of the ‘perimeter’ and into a variety of cloud apps and devices. Organisations need to re-evaluate the limits of their security platform to ensure that it holds firm against every eventuality, including the perennial weak links within the enterprise.

For example, more than ever before, employees are using their personal devices to perform their work duties. BYOD (bring your own device) enhances productivity and flexibility, but it can also lead to security concerns if the right security solutions are not put in place. Before Covid-19, BYOD was a significant trend, but just one of many on the security to-do lists of IT teams. The impact of the lockdown has shifted the goalposts, and new work-from-home arrangements have opened multiple attack vectors for cyberattacks, with people more likely to sign up for apps using their own Gmail email account, for example, quickly circumventing established security processes.

Similarly, when it comes to threats to enterprise cybersecurity, it is easier to focus on external third parties as the main source of risk. However, a considerable amount of data leakage comes as a result of insider threats – people within an enterprise, whether they divulge proprietary information with malevolent intentions, or are just careless employees that unwittingly share sensitive data.

Crucially, in building a security strategy for the cloud era, enterprises must also be cautious of disjointed solutions, as a disconnected approach may harm their ability to adapt swiftly in a highly remote and dynamic business environment.

For instance, the time and money associated with managing disjointed, disparate security tools can be effectively used elsewhere. In contrast, consolidating tools into a single platform can be highly effective, both operationally and in cost-effectiveness. Unfortunately, organisations often overlook architecture when considering practical security solutions. In doing so, they can saddle themselves with additional maintenance costs (such as employee time, upgrade requirements, and overhead expenses) associated with legacy and appliance-based solutions.

Architectures also claim to be cloud native when, in fact, they are merely hosted in private data centers. In practice, this means they still adhere to what is essentially an on-premises network model, and security vendors who build their solutions like this must continue to maintain data centres, stock them with hardware appliances for their customers and factor this into their pricing and service models.

Security threats and vulnerabilities change every day – that’s a given, and these issues require IT teams to remain vigilant and agile in the face of new challenges. In dealing with the here and now, however, what can’t be overlooked is the fundamental shift in infrastructure and network security brought about by the growth of cloud. Only by viewing security strategies in the context of these macro trends can organisations update their rule book to more effectively meet challenges head on, both now and in the future.


Anurag Kahol

Anurag expedites technology direction and architecture. Anurag was director of engineering in Juniper Networks’ Security Business Unit before co-founding Bitglass. Anurag received a global education, earning an M.S. in computer science from Colorado State University, and a B.S. in computer science from the Motilal Nehru National Institute Of Technology.

Choose an AI solution to transform beyond technology

Kit Cox • 09th December 2024

The first step is knowing exactly what your business wants to achieve with AI; think faster, smarter and more efficient. Once you know what you are working towards, you can start looking for a solution that can help you make it a reality. AI integration can feel like a daunting task at the beginning, so...

A Roadmap to Security and Privacy Compliance

John Lynch Director of Kiteworks • 04th December 2024

Only by understanding the current regulatory environment and implementing robust data protection measures, can organisations enhance their security posture, ensure compliance, and build resilience against the latest cyber threats. This article provides a comprehensive roadmap of how to do it.

Data-Sharing Done Right: Finding the Best Business Approach

Bart Koek • 20th November 2024

To ensure data is not only available, but also accessible to those that need it, businesses recognise that it is vital to focus on collecting, sorting and governing all the data in their organisation. But what happens when data also needs to be accessed and shared across the business? That is where organisations discover a...

Nova: The Ultimate AI-Powered Martech Solution for Boosting Sales, Marketing...

Erin Lanahan • 19th November 2024

Discover how Nova, the AI-powered engine behind Launched, revolutionises Martech by automating sales and marketing tasks, enhancing personalisation, and delivering unmatched ROI. With advanced intent data integration, revenue attribution, and real-time insights, Nova empowers businesses to scale, streamline operations, and outperform competitors like 6Sense and 11x.ai. Experience the future of Martech with Nova’s transformative AI...

How E-commerce Marketers Can Win Black Friday

Sue Azari • 11th November 2024

As new global eCommerce players expand their influence across both European and US markets, traditional brands are navigating a rapidly shifting landscape. These fast-growing Asian platforms have gained traction by offering ultra-low prices, rapid product turnarounds, heavy investment in paid user acquisition, and leveraging viral social media trends to create demand almost in real-time. This...

Why microgrids are big news

Craig Tropea • 31st October 2024

As the world continues its march towards a greener future, businesses, communities, and individuals alike are all increasingly turning towards renewable energy sources to power their operations. What is most interesting, though, is how many of them are taking the pro-active position of researching, selecting, and implementing their preferred solutions without the assistance of traditional...

Is automation the silver bullet for customer retention?

Carter Busse • 22nd October 2024

CX innovation has accelerated rapidly since 2020, as business and consumer expectations evolved dramatically during the Covid-19 pandemic. Now, finding the best way to engage and respond to customers has become a top business priority and a key business challenge. Not only do customers expect the highest standard, but companies are prioritising superb CX to...